Skip to content

Update libwebp and improve updates configuration #733

Update libwebp and improve updates configuration

Update libwebp and improve updates configuration #733

Triggered via pull request December 21, 2024 09:43
Status Success
Total duration 20m 21s
Artifacts 1

unit-test.yml

on: pull_request
Matrix: Execute unit tests
Perform Qodana analysis
2m 35s
Perform Qodana analysis
Fit to window
Zoom out
Zoom in

Annotations

5 warnings and 4 notices
Execute unit tests (ubuntu-latest)
ubuntu-latest pipelines will use ubuntu-24.04 soon. For more details, see https://github.com/actions/runner-images/issues/10636
Perform Qodana analysis
ubuntu-latest pipelines will use ubuntu-24.04 soon. For more details, see https://github.com/actions/runner-images/issues/10636
Perform Qodana analysis
You are using a non-compatible Qodana linter jetbrains/qodana-jvm:2024.2 with the current CLI (2024.3.3)
Perform Qodana analysis
You are using a non-compatible Qodana linter jetbrains/qodana-jvm:2024.2 with the current CLI (2024.3.3)
Perform Qodana analysis
You are using a non-compatible Qodana linter jetbrains/qodana-jvm:2024.2 with the current CLI (2024.3.3)
Execute unit tests (macos-13)
Submitted dependency-graph-reports/unit_tests_ci-tests-macos-13.json: The snapshot was accepted, but it is not for the default branch. It will not update dependency results for the repository.
Execute unit tests (ubuntu-latest)
Submitted dependency-graph-reports/unit_tests_ci-tests-ubuntu-latest.json: The snapshot was accepted, but it is not for the default branch. It will not update dependency results for the repository.
Execute unit tests (windows-latest)
Submitted dependency-graph-reports\unit_tests_ci-tests-windows-latest.json: The snapshot was accepted, but it is not for the default branch. It will not update dependency results for the repository.
Vulnerable declared dependency: build.gradle#L19
Dependency maven:ch.qos.logback:logback-core:1.5.12 is vulnerable , safe version 1.5.13 * [GHSA-pr98-23f8-jwxv](https://osv.dev/vulnerability/GHSA-pr98-23f8-jwxv) 5.9 QOS.CH logback-core Expression Language Injection vulnerability * [GHSA-6v67-2wr5-gvf4](https://osv.dev/vulnerability/GHSA-6v67-2wr5-gvf4) 2.4 QOS.CH logback-core Server-Side Request Forgery vulnerability Results powered by [OSV](https://osv.dev/)

Artifacts

Produced during runtime
Name Size
coverage_report Expired
3.61 KB